FreeDOS

Before September 1995, Microsoft Windows was an MS-DOS program. DOS was an easy to use command line operating system that provided you with complete ability to control and troubleshoot your computer. Microsoft's goal was to eliminate DOS, possibly to prevent you from having complete control of your own computer.

The last stand-alone version of MS-DOS was version 6. Unfortunately, that version is not Y2K compliant. Windows 95 and later came with MS-DOS version 7. Unfortunately, that version is too integrated with the operating system. It will not work without access to your hard disk.

FreeDOS is a PC compatible Y2K compliant DOS that you can download from www.freedos.org. FreeDOS fits on a single floppy disk and can be used to boot your computer. Download and unzip the file odin7bin.zip (756KB). Unziping will create the files diskcopy.exe and fdodin07.144. Put a blank formatted floppy disk in the drive. In the Start | Run dialog box, or at a command prompt type "diskcopy fdodin07.144 a:" to create a bootable FreeDOS floppy disk.

Why would you want to boot your computer with DOS? Maybe you want to use Windows XP without product activation.

First make sure that the BIOS boot sequence on your computer is configured with the floppy drive as the first boot device (or at least before the C: drive). To get to the BIOS configuration screen, press the "Delete" or "F2" key (depending upon your BIOS) while your computer is starting.

Insert the FreeDOS floppy disk in the floppy drive and start the computer. At the A:>_ prompt type DATE. FreeDOS will return your computer's current date, along with a prompt to enter a new date. Enter the date that you installed Windows XP (or at least a date before the 30 day expiration date). Remove the FreeDOS floppy disk and restart your computer.

Note: This will only work if Windows XP has never been started after the 30 day expiration date. The first time Windows XP is started after the 30 day expiration date will be the last time it starts.

Every time you start your computer, start it first with FreeDOS and reset the computer's date to the date that you installed Windows XP. Windows XP will think time has come to a standstill.

Note: Of course, Your file creation and last modified dates will not be correct, so this is not really a way for a serious user to bypass Windows XP product activation. However for certain purposes, like learning the Windows XP operating system, this can be a way to use Windows XP without product activation.

Microsoft should have made the expiration period much longer than 30 days. Maybe they want you to activate Windows XP before it crashes.

Permission is granted for the below article to forward, reprint, distribute, use for ezine, newsletter, website, offer as free bonus or part of a product for sale as long as no changes are made and the byline, copyright, and the resource box below is included.

About The Author

Copyright(C)2004 Bucaro TecHelp. To learn how to maintain your computer and use it more effectively to design a Web site and make money on the Web visit bucarotechelp.com To subscribe to Bucaro TecHelp Newsletter Send a blank email to bucarotechelp.com

maide service in Park Ridge ..
In The News:

Scammers create fake Evite invitations that mimic legitimate event emails, requiring users to verify senders and use antivirus software for protection.
The new Apple Watch hypertension feature passively monitors blood pressure patterns over 30 days using sensors to detect chronic high blood pressure signs.
Chrome extension spyware disguised as a free VPN service highlights security risks after it captured private browsing data from trusted sites.
New research shows how fatty acids in cooking oil can safely dissolve and recover silver from circuit boards without harmful chemicals or environmental damage.
The Fox News AI newsletter gives you information on the latest AI technology advancements, and about the challenges and opportunities AI presents now and for the future.
Anthropic investigates alarming AI abuse case where hacker automated entire cybercrime campaign using Claude, stealing sensitive data from defense and healthcare firms.
TikTok, Meta and YouTube restrict Charlie Kirk shooting videos with age gates and warnings while X faces criticism for allowing continued circulation.
Cybercriminals use fake troubleshooting websites to trick Mac users into running terminal commands that install Shamos malware through ClickFix tactics.
San Francisco startup Fable launches Showrunner, an AI platform dubbed the 'Netflix of AI' that generates animated episodes from text descriptions with Amazon support.
Apple raised iPhone prices for some models despite receiving tariff relief from President Donald Trump, with the new lineup starting at $799 for the base model.
A two-story 3D concrete printed home in Western Australia demonstrates faster construction methods that could reshape American housing amid rising costs.
Credit scores remain important during retirement for insurance rates and housing applications, while seniors become prime targets for identity theft and financial scams.
Scammers now send unexpected packages with QR codes that redirect victims to fraudulent websites or download malicious software to steal sensitive information.
Meeting AI tools record private conversations alongside work discussions, creating privacy risks that can be managed with proper settings and awareness.
Hotel privacy concerns are valid but rare, with methods to detect hidden tech using smartphone flashlights, mirror tests and scanning apps.
Improve your Wi-Fi speed and reliability with 10 simple router optimization tips that don't require special apps or expensive subscriptions.
A Columbia University breach exposed names, Social Security numbers and academic records of nearly 869,000 people, with notifications beginning in August.
Rental car drivers use AI-powered apps like Proofr to protect themselves from unfair damage fees as major companies deploy automated inspection tools.
Fox News' AI newsletter brings you the latest on technology advancements around artificial intelligence.
OnTrac data breach between April 13-15, 2025, exposed personal information of over 40,000 people including Social Security numbers and medical records.
A woman named Wika announces her engagement to an AI chatbot sparking worldwide debate about virtual relationships and technology.
The notorious people search site National Public Data relaunches despite a previous breach affecting 3 billion individuals, raising fresh privacy concerns.
Revolutionary TRAUMAGEL gel controls life-threatening bleeding from gunshot wounds and traumatic injuries, helping first responders prevent prehospital deaths.
Protect your home network by enabling proper encryption, creating strong passwords, checking connected devices and using VPN and antivirus software.
The Navy's solar-powered Skydweller drone flew nonstop for 73 hours in Mississippi, proving renewable energy can power long-endurance military missions.

Microsoft Great Plains: Government & Non-Profit Organization ? Workflow Implementation

Usually workflow & messaging is realized in CRM and then... Read More

Microsoft CRM Custom Design & Development: SDK, C#, SQL, Exchange, Integration, Crystal Reports

Microsoft CRM is new player on the CRM software... Read More

C++ Tutorials: 3, Program Flow (If, Else, While, For)

Program Flow is what you think it is. How the... Read More

Mozilla Vs. Firefox

For those who are unclear on the differences between the... Read More

What You Should Know About Installing Screensavers

Do you remember that frustrating feeling when you find an... Read More

The Secret of the Layer Styles Dialogue

When you double-click a layer in the Layer Palette, you... Read More

Navision Customization: C/SIDE, C/ODBC, C/FRONT, XBRL ? Development Options

Microsoft bought Navision, Denmark based software development company, along with... Read More

How To Identify, Cure and Prevent Spyware/Adware Infections

Just when you thought you were Web savvy, one more... Read More

DB Integration - Software for Combine MS Access Databases

Our company, Novaprof Inc., developed unique software - DB Integration.... Read More

How to Choose the BEST Charting Software

I suggest that you do not spend a lot of... Read More

S is for Spying, Surveillance -- and for Software as Well

Words we choose to describe things and phenomena often show... Read More

Lotus Domino: Reports and Connectors ? Crystal Reports, XML, ODBC/JDBC, OLE

Lotus Notes Domino is very efficient in electronic document workflow... Read More

Adware and Spyware Blockers

The most important things you can do for your computer... Read More

Destination: Desktop for Google

First we had the original Google search that evolved into... Read More

The Dirt on Screensavers

Remember back in the days where screensavers were the coolest... Read More

Microsoft Great Plains Integration Manager ? Advanced Techniques

Great Plains Integration Manager scripting and translation - overview for... Read More

Microsoft Great Plains Logistics & Warehouse Management ? Implementation & Customization Highlights

Logistics automation is often considered as barcoding extension to Sales... Read More

Anti-Spyware Protection ? Holes in the Shining Armor

Looking at all the ads which promise to get rid... Read More

The XP Firewall Isnt Enough

You might think you don't need a firewall... Read More

Assertion in Java

Assertion facility is added in J2SE 1.4. In order to... Read More

Configure Windows Indexing Service for Performance

The Windows Indexing Service provides you with the ability to... Read More

The Religion And Philosophy Of Small Internet Business

I have always had a tendency to focus on the... Read More

.NET :Solving the Multiple Inheritance Issue Under .NET Platform

.NET platform does not support multiple inheritance. Do not confuse... Read More

Introducing GRML

Creating a new markup language.Introduction.General Reuse Markup Langauge, or GRML,... Read More

Easy Guide to RAID Recovery

What is RAID RECOVERY?RAID stands for Redundant Array of Inexpensive... Read More

after renovation cleaning Highland Park ..